R3 3300X 1050 Ti sistem mavi ekran hatası

MemTest86 ile modülleri test eder misin?

Kod:
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

MEMORY_MANAGEMENT (1a)
    # Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000041792, A corrupt PTE has been detected. Parameter 2 contains the address of
    the PTE. Parameters 3/4 contain the low/high parts of the PTE.
Arg2: ffff81bffaea8010
Arg3: 0000000000020000
Arg4: 0000000000000000

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 2046

    Key  : Analysis.DebugAnalysisManager
    Value: Create

    Key  : Analysis.Elapsed.mSec
    Value: 2044

    Key  : Analysis.Init.CPU.mSec
    Value: 2687

    Key  : Analysis.Init.Elapsed.mSec
    Value: 77463

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 83

    Key  : MemoryManagement.PFN
    Value: 20

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


FILE_IN_CAB:  033022-27750-01.dmp

BUGCHECK_CODE:  1a

BUGCHECK_P1: 41792

BUGCHECK_P2: ffff81bffaea8010

BUGCHECK_P3: 20000

BUGCHECK_P4: 0

MEMORY_CORRUPTOR:  ONE_BIT

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  chrome.exe

STACK_TEXT: 
ffffdb05`94cc7db8 fffff806`368440ca     : 00000000`0000001a 00000000`00041792 ffff81bf`faea8010 00000000`00020000 : nt!KeBugCheckEx
ffffdb05`94cc7dc0 fffff806`3689e5d6     : 00000000`00000000 00000000`00000000 00000000`000007ad ffff81bf`faea8010 : nt!MiDeleteVa+0x153a
ffffdb05`94cc7ec0 fffff806`3689e6eb     : ffff81c0`dffd7540 ffffcb06`e340e700 ffffdb05`00000000 ffffdb05`94cc8330 : nt!MiWalkPageTablesRecursively+0x776
ffffdb05`94cc7f60 fffff806`3689e6eb     : ffff81c0`00000000 ffffcb06`e340e700 ffffdb05`00000001 ffffdb05`94cc8340 : nt!MiWalkPageTablesRecursively+0x88b
ffffdb05`94cc8000 fffff806`3689e6eb     : ffff81c0`00000000 ffffcb06`e340e700 ffffdb05`00000002 ffffdb05`94cc8350 : nt!MiWalkPageTablesRecursively+0x88b
ffffdb05`94cc80a0 fffff806`36804f4b     : 00000000`00000000 ffffcb06`e340e700 00000000`00000003 ffffdb05`94cc8360 : nt!MiWalkPageTablesRecursively+0x88b
ffffdb05`94cc8140 fffff806`36842961     : ffffdb05`94cc82e0 ffffcb06`00000000 ffff81be`00000002 00000000`00000000 : nt!MiWalkPageTables+0x36b
ffffdb05`94cc8240 fffff806`36812aa0     : 00000000`00000001 ffffdb05`00000000 ffffcb06`e340e550 ffffcb06`d7bc1080 : nt!MiDeletePagablePteRange+0x4f1
ffffdb05`94cc8550 fffff806`36c01dd9     : ffffcb06`daba68a0 00000000`00000000 ffffcb06`00000000 ffffcb06`00000000 : nt!MiDeleteVad+0x360
ffffdb05`94cc8660 fffff806`36c01470     : ffffcb06`daba68a0 ffffcb06`d58e4300 ffffcb06`d7bc1080 00000000`00000000 : nt!MiUnmapVad+0x49
ffffdb05`94cc8690 fffff806`36bff73f     : ffffcb06`daba6b20 ffffcb06`daba6b20 ffffcb06`daba68a0 ffffcb06`e340e080 : nt!MiCleanVad+0x30
ffffdb05`94cc86c0 fffff806`36c5dbf8     : ffffffff`00000000 ffffffff`ffffffff 00000000`00000001 ffffcb06`e340e080 : nt!MmCleanProcessAddressSpace+0x137
ffffdb05`94cc8740 fffff806`36cb26b6     : ffffcb06`e340e080 ffffe006`9a960060 ffffdb05`94cc8990 00000000`00000000 : nt!PspRundownSingleProcess+0x20c
ffffdb05`94cc87d0 fffff806`36cf73f8     : ffffcb06`00000000 00000000`00000001 ffffdb05`94cc89e0 000000da`a2391000 : nt!PspExitThread+0x5f6
ffffdb05`94cc88d0 fffff806`3680ef67     : 00000000`40dd0088 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSchedulerApcTerminate+0x38
ffffdb05`94cc8910 fffff806`369fbbc0     : 000000da`a4bff848 ffffdb05`94cc89c0 ffffdb05`94cc8b80 00000863`00000000 : nt!KiDeliverApc+0x487
ffffdb05`94cc89c0 fffff806`36a0905f     : 00007ff8`7ad05b90 ffffdb05`94cc8b80 ffffdb05`94cc8b18 ffffffff`ff676980 : nt!KiInitiateUserApc+0x70
ffffdb05`94cc8b00 00007ff8`7cc8cdf4     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceExit+0x9f
000000da`a4bff818 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ff8`7cc8cdf4


MODULE_NAME: hardware

IMAGE_NAME:  memory_corruption

STACK_COMMAND:  .cxr; .ecxr ; kb

FAILURE_BUCKET_ID:  MEMORY_CORRUPTION_ONE_BIT

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {e3faf315-c3d0-81db-819a-6c43d23c63a7}

Followup:     MachineOwner
---------
 

Technopat Haberler

Geri
Yukarı